Posts by Ontic
4 Ways Security Teams Can Holistically Mitigate Risks by Partnering with Human Resources and Legal
Tearing down departmental walls is essential for security teams, especially those tasked with responding to threats of violence or significant security events. Information-sharing silos within organizations hinder fast and effective responses. In extreme cases, poor communication can increase risks to a company’s employees and assets. Business leaders recognize the value of cross-functional teams in their…
Read More5 Best Practices to Successfully Connect Systems in Your Technology Ecosystem
Integrating technology-based security solutions with manned guarding has gained significant traction, encompassing a wide range of applications. These include situational awareness and threat intelligence platforms, risk mitigation planning, and remote video and alarm monitoring. Major events such as natural disasters, cyber threats, violent hate crimes, and pandemics have consistently acted as catalysts for technology adoption.…
Read MoreDangerous Admirers: How to Protect Public Figures From Harassers As Legal Protections Are in Jeopardy
In 2010, country-music singer Coles Whalen began receiving messages from a fan on her Facebook account. While Ms. Whalen ignored the relatively benign messages at first, the fan kept sending her messages—thousands over the course of several years. The fan praised her talents but also alluded to following her and knowing the whereabouts of her…
Read More3 Critical Areas Technology is Influencing The Latest Executive Protection Strategies
Physical and cyberattacks are on the rise. According to the FBI, the most recent data shows an 82% rise in violent crimes from 2017 to 2021. Another study from the FBI reports a 52% increase in active shooter incidents in the same four years, and cybercrimes are also increasing. In the FBI’s 2022 Internet Crime…
Read MoreHow Security Teams Can Leverage Crime Data to Protect Their Assets and Facilities
Summary text Whether you’re scouting for a new business location or assessing the safety of an existing one, corporate security professionals focused on keeping facilities, employees, visitors or other assets safe, need a way to better understand the geographical risks surrounding them. A recent report by the Council on Criminal Justice revealed that robberies affecting…
Read MoreTips from the Top: Corporate Security Leaders Share How to Build a Team Today That’s Fit to Tackle Tomorrow’s Risks
Did you know that in 2021 the global estimated shortage of cybersecurity professionals was 2.72 million? Today, according to a study by (ISC)2, the global cybersecurity workforce gap has increased to 3.4 million people. Staff shortages are an all-to-familiar problem for corporate security teams, which is getting more complicated to solve. The skills needed to…
Read MoreCorporate Security Teams Face a New Challenge Right In Their Backyards – Relevancy
Corporate security teams face a new challenge in the threat landscape – relevancy to the bottom line. Typically, board members view a security department as a cost center, and that’s a perception security leaders want to change. Security department heads look for novel ways to illustrate how their department helps achieve the business’s strategic goals.…
Read More5 Essential Metrics and Methods to Prove Your Corporate Security Program’s ROI
Business executives are taking a blade-like approach to stabilize their budgets in today’s challenging economy. The technology industry is feeling the brunt of the cost-cutting measures. According to the Wall Street Journal, tech giants like Alphabet, Dell, and Meta are cutting an estimated 28,000 jobs combined. Banking behemoths like Goldman Sachs, McKinsey, and PayPal plan…
Read MoreA Constant State of Crisis: How Corporate Security Teams Are Adapting to the New Normal
Corporate security teams face a new normal, and it’s called permacrisis – a state where instability and insecurity are constant. While many security teams already operate in this mindset, the difference is that the security department is one of many teams in constant vigilance. As a result, departments across organizations are becoming aware of permacrisis…
Read More6 Things to Consider When Buying a Case Management Solution
Despite the fact that leaders in physical security, cybersecurity, IT, human resources, and legal and compliance all deal with threats and business risks, each department often has a unique method and tool for documenting and managing incidents. These organizational divisions across departments isolate threat intelligence and negatively affect business continuity. In a recent study, 50%…
Read MoreA Physical Security Imperative: Critical Infrastructure Security
Attacks on critical infrastructure have doubled in the last year, with events such as the attacks on Ukrainian power companies, Colonial Pipeline and JBS Food, that have brought to light the necessity of critical infrastructure security systems and networks to function properly for society to operate. The impact of recent cyber attacks on power grids…
Read MoreSecuring Budget for Your Corporate Security Program and Earning Your Seat at the Table
Corporate Security Strategic Positioning Key Factors to Recieve Financial Backing Placing Monetary Value on a Risk Promoting Cross-team Collaboration Advice for Funding and Resource Conversations While security teams are tasked with securing their business’s people, operations, and assets, they’re often faced with resistance from internal stakeholders when establishing their program budget. For security leaders to…
Read MoreUsing The Indications and Warning (I&W) Analysis to Manage Organizational Risk
The Center for Protective Intelligence partnered with Scott McHugh who works for the Institute for Homeland Security at Sam Houston State University to develop this piece. One of the key reasons we created the Ontic Center for Protective Intelligence (CPI) was to share industry tools, best practices and lessons learned to help those who protect…
Read MoreCase Management Software – A Complete Introduction
In the old days, protective intelligence case management software was very primitive. Typically, files sat on desktop hard drives or local servers. When a person of interest (POI) called to make threatening statements or mailed an unwanted package to an executive, an investigator would respond directly or involve local law enforcement. Then, they’d open the…
Read MoreUsing Insider Threat Awareness as a Risk Management Strategy
Searching for Insider Threat Indicators Insider Threat Awareness Strategies Teamwork Enhances Insider Threat Management Keys to Workforce Engagement for Insider Threat Prevention Effective Insider Threat Awareness Management Does Ontic Offer an Insider Threat Monitoring Solution? Companies are increasing their focus on building insider threat awareness to create more resilient defenses against theft and unauthorized access…
Read More6 Measures Safety, Security and Protection Leaders Can Take To Be Proactive During Volatile Times
In our recent webinar, Leading Corporate Security During Volatile Times, Ontic security experts joined to discuss ways for security leaders to future-proof their programs, prioritize protection and leverage technology to help mitigate risks inflicted by the rapidly-evolving threat landscape. The panel consisted of Chuck Randolph, Executive Director of Strategic Intelligence, Dr. Marisa Randazzo, Executive Director…
Read More